Security Spaces Worth Watching

People sometimes ask about the process by which we select companies for participation in our accelerator program. One of the challenges with investing in the information security market (or any early-stage technology space) is that of identifying companies with a product that is both different and useful.While "different" is an important criterion, it is necessary but not sufficient for a product to be successful in the market. For a product to be “useful,” it must address a real-world problem in an accessible way.Thinking about what might be useful naturally leads us to ponder where the real, unsolved problems lie. In this article I'll describe some areas in which I see opportunities for people who want to solve important security problems in a new and different way. This list is by no means exhaustive, but it includes approaches where we see underserved markets, new ways to deal with old problems, or significant chances to make a dent in the continuing onslaught of security threats that people experience every day.Encapsulated ExpertiseThis isn’t a technology approach so much as a useful measure of whether a company’s product is likely to matter in the market. As I described in a previous article, if one looks at the history of the information security market, many of the most significant developments have been products that somehow embodied the experience of skilled people who may be expensive, difficult to find or hire, or simply rare enough that it is impossible to find enough of them to fully staff a security function. It is probably fair to say that the same value applies in the network operations markets as well. As we saw with the network intrusion detection system (IDS) market, a product that can identify important events and route them to the most appropriate people may allow an enterprise to make more efficient use of the people who are already there.The hard part of building good products that embody or automate expertise is that there are natural pressures that tend to make the product complicated for the user. The most successful products not only solve complex security problems with automation, but also provide improvements in product usability and organization workflow.A definition of a “home run” might be a security product that also simultaneously improves the user experience or user interface of something that people do every day. Those are rare, but when it happens, the opportunity is worthy of note. By some measures, Single Sign-On technology might be one example of improving the end-user experience while also enhancing security. It’s not always easy to deploy, but if done well, many people save time and administrators have a better handle on identity management.The Internet of ThingsA problem in the security business (and perhaps any technology sector) is that people toss terms about without actually agreeing upon what they mean. Perhaps the best example of this is "The Internet of Things."  Because anything can be a "thing" it's difficult to even know where this category begins and ends.If you have been wondering which things are capital-T "Things," here is a list of some examples that might fit the description:

  • Network-connected home appliances like the Nest Thermostat
  • Network-connected sensor devices such as electric power meters
  • "Smart cars" and "smart highways"
  • Industrial control systems
  • Remotely piloted vehicles
  • Any device that can be attached to a wired or wireless network that isn't a computer or workstation at which you can sit.

This category creates security challenges because:1) These things can provide a point of entry for attackers to the rest of your network2) Some of these things have the ability to affect the physical world in real ways3) These things may be transmitting information about you or your environment with significant implications for your privacy.Sometimes, existing tools may be helpful for improving the security of connected devices, but there are constraints that may not be present with a regular computer. Connected devices may have minimal processing power, limited communications bandwidth, and in some cases, very limited power budgets due to battery size limitations. This necessitates new ways of approaching security management and monitoring.Software Defined NetworksAnother area that is showing up more and more in the enterprise IT conversation is software defined networking or "SDN." This is another space that means different things to different people (and vendors), but the general idea is that the flexibility of networking equipment hasn't improved as quickly as the flexibility of computing systems has. For example, the use of virtualization has made it very easy to move an entire server's configuration and data from one computer to another very quickly and much more easily than the traditional process of installing everything on a new machine, verifying that the new system does the same thing as the old one, and then moving the data.Similarly, software defined networking offers the promise of simpler and more flexible network routers and/or switches where even low-level configuration changes to hardware behavior can be stored in profiles and pushed out from a central management point. This technology potentially even allows for radical reconfiguration of the network "fabric" while systems are in operation without significantly impacting throughput on the network.Obviously, this flexibility is powerful for enterprise network managers in terms of enabling new ways of adapting to enterprise needs very rapidly. This flexibility may come at a security cost, however. The standards and technology approaches in this area are still somewhat young, and some of the emerging standards don't address security in much depth yet.Some things to consider about SDN include:1) The implications of centrally storing the configuration of your entire network on a system that can transmit changes that take effect rapidly;2) How to prevent unauthorized access to the management/change function on individual routers or switches3) Emergent network effects after making a change - do side effects "ripple" through the network afterward? How long do they take to dissipate?Zero-Trust Security ModelsRecently, a number of organizations have been advancing an approach to security that is a departure from traditions and practices that current information security practitioners hold dear.The "zero trust" or "untrusted everything" approach is driven by the need to acknowledge that threats and attacks have changed more quickly than our defenses have. Current environments often have pre-defined trust relationships between various  computer systems. The problem is that an attacker can compromise one system and use it as a springboard or stepping stone to other systems that are configured to trust the first.These approaches often explicitly reject the idea that there is an "inside network” of trusted resources and an "outside network" full of bad actors waiting to attack things.In the past, enterprises would often deploy some perimeter security technology at the border between the “inside” and the “outside”, while frequently neglecting security improvements to systems on the “inside.” Security people have long referred to the resulting condition as having a “hard shell with a soft, chewy center.”Today, not only is there ambiguity about exactly where “inside” ends and “outside” begins but also an increasing mix of mobile devices that may connect to internal networks while also sometimes traveling to hostile or insecure networks. Using your mobile handset in a favourite coffee shop and then in the office might be an example of that scenario. Sometimes these devices may even be personally owned, which may make it difficult to choose a satisfactory protection regime that allows users to get their work done on tools with which they’re the most comfortable.In order to even begin to address this ambiguous environment, it is necessary to make some decisions. One decision that can guide the beginning of a workable strategy is to declare that bring-your-own-device environments, and networks running personal applications should be considered untrusted.Some organizations choose to turn a blind eye to the prevalence of personally owned devices and personal applications while tacitly acknowledging that there is a productivity benefit to allowing their use. Reality requires that an organization develop a strategy to mitigate risk sufficiently in a world that isn’t black-and-white. 

To Mach or Not to Mach

“To Mach, or not to Mach”So you’re thinking of applying for the Mach37 program? You’re unsure. You’re skeptical. After all, you know this industry inside and out. You’re convinced your solution is the hottest thing going and there’s no competition. You are going to raise some capital from the money you’ve saved, get a few friends to kick in and you’ll sell this company for a gazillion dollars in a year or two to Facebook. Simple plan. Fool proof. That’s why everyone does it, right?Not so fast…What do your customers think? Oh you don’t have any yet? Surely they need this solution because you know your technology. You’ll just call up a few government clients where you provided great support and they will just write the Purchase Order. Maybe. Or maybe you’ll chase the “opportunity” for 18 months (standard) while you pour all of your money into product development. Double your estimate of development time and cost. The bank account is dwindling. Maybe you’ll just take a part-time support contract and bill some extra hours. There goes 30 hours that you are going to need but just don’t know it.Call John and Susan. They are great sales people and are under appreciated at their established publicly traded firm and surely can “moonlight” and get your product out there. They surely will work for “equity” and prioritize this over their $150k year guaranteed salary with bonus opportunities.Have you thought about intellectual property protection? Trademarks? Total available market? Go-to market strategy? You’ll just figure it out along the way and find an outsourced firm to do that.You’re a little frustrated though because you’ve explained this technology to your peers and they just don’t get it. It’s because you’re just too smart. It has nothing to do with your inability to articulate the value proposition.You’ve looked at Mach37. They want a small percentage of your company from the start. Are they crazy? This company is going to be worth millions and you’re going to maintain 90% ownership. If you need capital, the angels will certainly come knocking on the door and Venture Capital firms will stroke checks for millions, asking, asking only a few percentage points.A backup plan is good. You’ve heard Kickstarter crowd funding is a sure fire way to raise a ton of money. Fool proof plan…can’t lose.At this juncture, may I suggest setting up a lemonade stand and charging $100 per cup? You’ll more likely to be successful.Mach37 partners know the industry. They are connected to almost EVERYONE and you will be introduced to many of them. They know products. They understand the market, the competition, the pitfalls and they know how to develop a successful business plan. They are patient. They understand pivoting. They are a holistic accelerator that will give you the best chance to be successful. They provide funding. They introduce you to the real players. And the Thursday night dinners are pretty good too (I highly recommend the cannoli)!Summarized…apply. Consider it a privilege to be considered and an honor to be accepted. Focus and give 110% to the program if you get in. Be the first in and the last to leave every day. Execute. Accept criticism and feedback. Engage. Debate. Fail. Pivot. Improve. Succeed. Excel.My name is Shawn Key. I am the founder of Key Cybersecurity, Inc., a Mach37 inaugural cohort member. We are the developer of CyberMerlin, a cyber security illicit file detector geared to Fortune 500 and K-12 enterprise network organizations. We raised $250k in funding in four months and are poised for success. I continue to reach back to Mach37 weekly to ensure I am focused and on the right path. I owe this chance to be successful to Mach37 and the great resources they introduced to me during the program. By far, this is the best experience I have ever had and I am thankful to everyone who took a chance on me and set me on the path.The ball is in your court….apply.Sincerely,Shawn R. KeyFounder, Key Cybersecurity, Inc.www.keycybersecurity.comskey@keycybersecurity.com"2014 NVTC Destination Innovation Award (Security Category)

CTO SmackChat: Minimalism

By now, most entrepreneurs have adopted the lean startup principles advocated by Eric Ries in his book The Lean Startup. A key concept is the Minimum Viable Product, the mechanism used to convey your core product ideas to potential early users, and test key market assumptions in an iterative process to ensure that what you finally deliver both solves a problem and can generate enough paying customers to build a business. Of course the hard nut with this concept is figuring out “minimal” and “viable” in a world where your startup may be created based on a good idea and not much else.

I have experienced first-hand a number of the traps that technologists tend to trip over with this concept. The classic one of course is building products that are never quite ready to ship because they need just one more feature. Early in my career I developed a number of highly optimized protocols for satellite-based networks; it turns out that only satellite builders determine the protocols that fly, and the best technology is often not the winner. Complexity is another dangerous siren song – after a few meetings where it takes half an hour for even the friendliest, most perceptive customer to go “aha!” you begin to wonder about the guy who made millions selling those plastic electric outlet covers to prevent toddlers from sticking their tongues in the outlet.

One of my startups embodied all of these traps in a single great idea. Well before iTunes perfected the concept, we built and tested a very efficient delivery system for selling individual movies, songs and other content onto end user devices. At the time, transmission costs were high and credit card transaction costs were also high. We conceived a closed loop where content was aggregated at a central point, shipped over satellite to every TV station in the country, and streamed over the unused bandwidth in HDTV to a small receiver gizmo connected to end user devices that would decode the signal and securely aggregate single transactions into a monthly billing. The actual system was tested in New York, Trenton, NJ, Baltimore and Washington DC, and overnight we could stream enough content to make the top 100 movies, 1000 songs, and other content instantly available to millions of users. Even the back end worked, but in the end I believe I was the only person ever to complete an actual purchase and pay for it on my credit card.

So how do you figure out the Minimum Viable Product? Especially when a company is just starting, the key notion is to get your idea in front of potential customers and see if it solves a problem they care about. At this stage it doesn’t take a lot of development, but just enough to be able to describe the problem and how you address it, the value proposition for the user, and enough of an indication of what a user would see and do to make it feel real. The acid test at this stage is finding a potential customer who indicates that if you can build it, they will try it and eventually buy it. That establishes the “viable”. Beyond that, the “minimal” is driven almost more by schedule than by features. How long will that first customer wait before they forget about you? How much do you have to demonstrate in terms of solving the core problem to entice your customer to take those next steps down the development path with you? In the end, both “minimal” and “viable” are defined by your early customers, not by you. Your job is to make a guess that is close enough to keep those early customers engaged until you are actually in a position to deliver something.

David Ihrie is CTO of MACH37 and has been the lead technical person for six startup companies. He has a BS in EE/CS and an MS in Management specializing in the Management of Technological Innovation, both from MIT.

Reflections on Mach37 F13 (and some news)

We at Mach37 have decided to modify the terms of our initial investment in each company in our Spring 2014 cohort to double our financial commitment to $50,000.  This additional financial investment will not only help Mach37 entrepreneurs attract complementary team members, but also will provide them with additional resources necessary to expand target market validation and further accelerate technology development. 

Earlier this month, Mach37 completed its first Cybersecurity Investor Demo Day.  Along with six CIT GAP Fund cybersecurity entrepreneurs, our four F13 (Fall 2013) cohort participants presented their companies to an audience of over 100 information security investors.  By all accounts, their presentations were successful and I believe they foreshadow many future successes by Roy Stephan (PierceGTI), David Lehrer (Conatix), Ethan Allen (Sikernes) and Shawn Key (Key Cybersecurity). 

As I think about each of their presentations, it seems almost unfair that they were limited to eight minutes each.  The brevity of a demo day pitch belies the immense amount of work each of these entrepreneurs delivered over the past four months.  As anyone who has ever built an effective investor pitch will attest, the significant majority of the work is conducted weeks and months ahead of time. 

Roy, David, Ethan and Shawn sprinted through Mach37’s 14-week curriculum:  Fully analyzing their competitive environments; effectively positioning their respective product concepts; developing unique technical capabilities; and generating significant market validation from target market customers.  As all four of them will attest, the Mach37 program is not for the uncommitted. 

Based on our collective observations from F13 and the amount of work delivered by its entrepreneurs, the partners at Mach37 want to make an important recommendation to future Mach37participants:  Find capable, full-time partners.

To encourage future applicants to find complementary partners, we are placing a greater emphasis on having multiple founders as part of our core selection criteria.

The amount of effort required to develop and implement a business concept over a brief 14-week period while also designing and delivering a functional prototype is more work than one full-time founder can reasonably manage.   The best founding teams usually include full-time technical and entrepreneurial founders, all of whom understand the customer problem they are solving and how to share responsibility as they build their respective businesses. 

Achilles Heel … Sales

Over the years I have been a part of several startup teams and am now involved with the birthing process of security start-ups. What has become evident is that great and innovative solutions to BIG problems, better mousetraps, and totally obsessed start-up CEOs far too often fall short of the goal line… Why?: because they do not see their job is to sell.

Startup CEOs fail to understand that getting and keeping their first customer is far harder than finding outside investment… they may well find someone to invest the first time, but without real paying customers the game is over.

Last year was an exciting year for entrepreneurs as investment firms ponied up more than $1.4 billion to security startups and companies in 239 deals (through June 2013). However, only 27% of companies in 2013 were able to secure outside funding within one year. Ultimately, only 36% of accelerator companies since 2005 added to their seed and angel rounds after graduating from the accelerator - due in large part to their inability to gain sales traction in the market.

 Every day, we see angel and early seed investors who usually focus on the CEO and CTO --- the leader with the vision and the guy/gal who is putting hands on the keyboard --- what they overlook is the sales process. Too often the CEO and CTO don’t see themselves as the sales person or closer. This is the Achilles Heel – great ideas and products don’t sell themselves: the startup founder must … sell the idea, sell the vision, sell the Proof of Concept, sell the solution, sell the team, sell … sell … sell… and get a paying customer who believes and shares their vision of the solution.

Start-up founders who are going to jump into this big pond, must be focused on selling during every waking moment. If not, their start-up dream will come to a sudden (and not so pleasant) end quickly.

TheSalmonSpeaks: Net Neutrality

Occasional rants are good for the soul. If you disagree with the opinions expressed, please take it up with The Talking Salmon.January 15th the U.S. Court of Appeals for the District of Columbia struck down the FCC net neutrality regulations covering internet access. The press coverage digs into the arcane regulatory discussion around whether internet providers are “common carriers” or not, but of course this is really a heavyweight fight about money. In one corner are Verizon and their Internet Access Cartel (IAC) buddies, the cable companies. In the other corner are Google and their internet…well, there’s Google. Lurking in the shadows of the third corner are the traditional content providers, the axis-of-evil made up of the traditional TV networks, Hollywood, and their device friends making smart 3D super high definition large screens. Over there in the fourth corner are the cats and dogs like Netflix, HBO, and the new breed of independent short form internet content folks. OK, this is really more like one of those wrestling tag team matches than a heavyweight fight.Here’s the deal. Going back nearly to the dawn of history when the log carvers and the log drummers fell out there has been an ongoing battle between people who develop content (those artistic types) and people who build the infrastructure to get content to the people who want it. The key lesson from history is that no matter the incentive, these tribes have utterly failed to intermarry. Content providers are bad infrastructure builders, and vice versa.The Salmon agrees with the mantra used by broadcasters to justify letting broadcast networks wither on the vine: “Content is King”. Ultimately this is due to the “eyeball-bandwidth” product, the amount of information any individual can absorb at once (the Shannon limit for people) multiplied by the number of hours per day, generally not exceeding 24, times the 8 billion people in the world. It’s your eyeballs they want to own. As you can see, not counting a few benighted third world countries, we are nearing the theoretical eyeball-bandwidth product limit where it becomes simply a fight for market share. And people will opt for the highest value content…Content is King.So, who’s on first? Google of course is the de facto monopoly intermediary for internet content. They want net neutrality, unless they can actually build a virtual network of Android devices, in which case they are against it. Verizon and friends are getting squeezed…land lines are dead, SMS revenue has dropped for the first time, the Internet of Things probably only needs that old 2G network, not 4G LTE, people are starting to drop cable subscriptions and there is significant pricing pressure on internet connectivity. Almost makes you feel sorry for them, and moving to extract higher revenue from the pipes through competitive access pricing is a rational move. With vertical integration the goal for everyone, you would think the broadcasters, Netflix and crew would be looking to buy Aereo instead of killing it, but then far-sightedness has not necessarily been a virtue in that world.Technologists unite! Here’s what we could do, if we had the time. It might be that the Aereo court decisions make rebroadcast of initially free internet content OK, in which case small community ad hoc networks with one Verizon subscription, one cable subscription, etc. would be a great service to provide for your friends and neighbors. Seems like VPN tunnels to the “Free Internet” would re-disintermediate the greedy pipe guys. And of course innovation is a wonderful thing. Send your ideas and comments to The Talking Salmon, care of Daveknology. Remember: they’re your eyeballs.David Ihrie is CTO of MACH37 and has been the lead technical person for six startup companies. He has a BS in EE/CS and an MS in Management specializing in the Management of Technological Innovation, both from MIT.